Nexuscore_MCP
by sjkim1127
Overview
AI-driven dynamic malware analysis server for interactive debugging, inspection, and analysis of evasive malware.
Installation
.\target\release\nexuscore_mcp.exeEnvironment Variables
- CAPE_API_URL
- CAPE_API_TOKEN
- RUST_LOG
- VT_API_KEY
- SCYLLA_PATH
Security Notes
The server's core functionality involves highly privileged operations such as process injection (Frida), memory manipulation, and interacting with low-level Windows APIs, which are inherently high-risk. While the codebase itself does not show direct malicious patterns or hardcoded secrets (API keys are fetched from environment variables), its power means that if the AI agent or the host running NexusCore were compromised, it could be used for malicious purposes. Explicit `unsafe` blocks are used for Windows API calls, which is common and justified for this domain. External tools like `tshark`, `handle.exe`, `procdump`, and `ScyllaTest.exe` are called without explicit path sanitization, relying on the system's PATH configuration, which introduces an environmental risk. The `inject_script` functions directly execute JavaScript, a core feature necessary for dynamic analysis by an AI agent, but this must be controlled by a trusted agent.
Similar Servers
inspector
Inspect, debug, and interact with Model Context Protocol (MCP) servers, including OAuth authentication flows, resource management, and tool execution.
mcp-windbg
Bridges AI models with WinDbg/CDB to analyze Windows crash dumps and connect to remote debugging sessions.
consult7
Consult7 is an MCP server enabling AI agents to analyze extensive file collections (like codebases) using large context window models via OpenRouter, exceeding typical agent context limits.
Windows-MCP.Net
Enabling AI assistants to automate tasks and interact with the Windows desktop environment.